Results 251 to 260 of about 3,264,256 (293)
Some of the next articles are maybe not open access.

Data security of smart cities

Proceedings of the 3rd International Conference on Smart City Applications, 2018
The smart city is a new concept of urban development. It is about improving the life quality of city dwellers by making the city more adaptive and efficient, using new technologies that rely on an ecosystem of objects and services. The scope covering this new mode of city management includes: public infrastructures (buildings, street furniture, home ...
Naoufal Ainane   +2 more
openaire   +1 more source

Data security report

Information Management & Computer Security, 1996
Highlights the findings of an extensive, questionnaire-based programme of research into data security among medium-sized and large organizations in the UK. Comments on the ways in which new trends in information technology will affect data security and emphasizes the need for companies continually to re-evaluate and upgrade their data security measures.
openaire   +1 more source

Security in Data Warehousing

2000
Data warehouse [2, 4, 5, 6] is an integrated repository derived from multiple source (operational and legacy) databases. The data warehouse is created by either replicating the different source data or transforming them to new representation. This process involves reading, cleaning, aggregating and storing the data in the warehouse model.
openaire   +1 more source

Big data security

Network Security, 2012
The term big data has come into use recently to refer to the ever-increasing amount of information that organisations are storing, processing and analysing, owing to the growing number of information sources in use. According to research conducted by IDC, there were 1.8 zettabytes (1.8 trillion gigabytes) of information created and replicated in 2011 ...
openaire   +1 more source

Data Access and Security

2003
In Chapter 4, we combined the concepts from Chapter 1, the framework design from Chapter 2, and the technologies from Chapter 3 to create about half of the CSLA .NET framework. In this chapter, we’ll continue the process, completing implementation of the remaining classes.
openaire   +1 more source

Data security

Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241), 2002
Elisa Bertino, FERRARI, ELENA
openaire   +2 more sources

Big Data - Security and Privacy

2015 IEEE International Congress on Big Data, 2015
Technological advances and novel applications, such as sensors, cyber-physical systems, smart mobile devices, cloud systems, data analytics, and social networks, are making possible to capture, and to quickly process and analyze huge amounts of data from which to extract information critical for security-related tasks.
openaire   +1 more source

Data Mining for Security Applications

2004 International Conference on Machine Learning and Applications, 2004. Proceedings., 2005
Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Cyber security is the area that deals with cyber terrorism. We are hearing that cyber attacks will cause corporations billions of dollars. For example, one could masquerade as
openaire   +1 more source

Securing Data with Workgroup Security

2004
Protecting and securing your data is a matter of balancing software technology and people processes. If you trust the people who use your database, then data protection is a straightforward computer process. If you cannot afford to trust your users, you have to make it as difficult as you can for users to thwart your security and protection measures ...
openaire   +1 more source

Data and applications security

Data & Knowledge Engineering, 2002
Thuraisingham, Bhavani   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy